Research data is our most valuable, as well as our most vulnerable digital asset, and this is true for individual researchers as well as the university as a whole. Knowing how to properly store, secure and share your data can make all the difference to your research career.
We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.
We're all in this together video series
As open as possible
Cybersecurity for researchers, academics and their research data
We know that, as researchers, you need a certain level of openness and flexibility in your infrastructures to undertake your work, but this must be balanced by making the appropriate choices when it comes to cyber threats.
As closed as necessary
Cybersecurity for professional services staff
Professional services staff at Imperial are entrusted with some of the university’s most sensitive data, from HR records to payroll and student information. Access to this data must be carefully managed.
We're all in this together
Cybersecurity for everyone at Imperial
To keep Imperial secure we need all members of our community - staff and students - to take their safety and security online seriously.
These videos have been created in collaboration with Research England and our academic community using Enhancing Research Culture funding.
What can I do?
The university offers a wealth of guidance and support to help you stay safe from cyber threats. Here’s a distillation of some of that key guidance. And remember, if in doubt, contact ICT.
What can I do?
Data Management is Cybersecurity (Storing Research Data)
Where you store research data matters, and depends on the type of data you’re handling.
- Find ou about personal file storage options and quotas
- Find out how to manage your specific research data
- Learn more about our research data environments
- Where to store large volumes of non-sensitive research data
Data Management is Cybersecurity (Sharing Research Data)
Collaboration is essential in research, and it’s important to make sure that your data is stored and shared as securely as it needs to be with your collaborators
Imperial-friendly apps
Free platforms and unvetted AI services may trade on you and your data. Check whether the university provides a secure alternative first.
Managing your own devices
If you’re managing your own devices, be sure to keep them updated and secure, especially when taking them offsite or travelling.
- How to request an unmanaged device
- How to keep mobiles and tablets protected
- SSH gateway with Multi Factor Auhtentication (MFA)
- Bring Your Own Device (coming soon)
Managing Research Infrastructure
Managing Research Infrastructure
- Research Computing Services
- Research Computing Services user guide
- Securing your own infrastructures (coming soon)
Working overseas
Though not all risks come from the outside, it’s important to be mindful of potential threats that can arise from collaborating or working overseas, and from nation-state attacks.
- Research Security - is your work a target?
- International travel and conferences
- Alternative remote access
- Overseas research toolkit
Report an incident
Cyber attacks now evolve within hours rather than days. Report suspected or real incidents as soon as possible.